A high-risk issue is discovered during an information security risk assessment of a legacy application. The business is unwilling to allocate the resources to remediate the issue. Which of the following would be the information security manager’s BEST course of action?
Salilgen
Highly Voted 10 months, 1 week agod7a2ba6
Most Recent 3 weeks, 3 days agoATT5832
1 month, 3 weeks agoInfosecnerd
4 months, 3 weeks agoyottabyte
9 months, 2 weeks agoPOWNED
11 months, 3 weeks agosecdoc
1 year, 3 months agoKunzle
1 year, 4 months agoMarcelus1714
11 months, 1 week agoMarcelus1714
11 months, 1 week agoMacDanorld
1 year, 3 months agooluchecpoint
1 year, 4 months agoGoseu
1 year, 5 months agorichck102
1 year, 6 months agodark_3k03r
1 year, 8 months agoCarlPTY07
1 year, 10 months agocangurer
1 year, 10 months agoBroesweelies
1 year, 11 months agoMyKasala
1 year, 11 months agoaokisan
2 years ago